Blog Posts Process Management

Protecting the crown jewels: focus on privileged account security

Blog: The Holloway Angle

Recently, CyberArk’s Inspire 2019 conference was held in Amsterdam, attended by some 1,000 security practitioners with an active focus on the privileged account security space. The event also afforded analysts the change to quiz the company’s executives as well as some of its customers. Insufficient attention paid to identity management Privileged account security fits into the identity and access management technology stack. Managing identities and associated entitlements is essential since hacking identities is an increasingly common tactic used by adversaries who are looking for entry into an organisation’s network. Most threats seen are to do with identity. Published recently, the

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/protecting-the-crown-jewels-focus-on-privileged-account-security-2/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×